Module 5 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 39 minutes
Difficulty
Beginner
Video Transcription
00:00
welcome to less than 5.8. Let's just summarise what we learned here in this fifth module.
00:06
We discussed the test and release portion. Uh, we're running in our pipeline, and I took a look at some of the dass tools or capabilities. What for? Scanning the applications. Demo Jenkins. We had a dass to our pipeline, so it's getting a lot more mature now.
00:24
And we looked at maturing the delivery phase specific to the OAS deficit cops maturity model.
00:30
I looked at the I asked tools integrating them into your application, or at least in the development phase,
00:38
and then looked at their capabilities and then actually demoed it. And we saw what it looks like from the console of of a tool of re application actually getting attacked by a dash tool and what the voter or the reporting looks like. And then we compared the S ea from the I s tool
00:55
and the what We ran into pipeline just to see
00:59
what, what what we may have missed.
01:03
Here's a quick quiz I asked. Tool can replace the need for a desk and SAS scanners. Is this true or false?
01:11
Says this fall, says we mentioned? I asked. Tool has similar capabilities. Work unstick as assassin. The third party, the S E. A scanner, but it could only monitor attack. You need the dynamic tool to actually run against it to generate for it to see these patterns and identify vulnerabilities.
Up Next